Skip to content

Commit 39dd10e

Browse files
authored
Merge pull request #208091 from limwainstein/dns-ama-connector
New connector page for AMA over DNS
2 parents c5805cb + 7dd6876 commit 39dd10e

15 files changed

+440
-18
lines changed

articles/sentinel/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,8 @@
240240
href: ama-migrate.md
241241
- name: CEF over Syslog sources
242242
href: connect-common-event-format.md
243+
- name: DNS via AMA
244+
href: connect-dns-ama.md
243245
- name: Syslog (raw) sources
244246
href: connect-syslog.md
245247
- name: Microsoft Sentinel Data Collector API
@@ -514,6 +516,8 @@
514516
href: cef-name-mapping.md
515517
- name: Windows security event sets
516518
href: windows-security-event-id-reference.md
519+
- name: DNS over AMA reference
520+
href: dns-ama-fields.md
517521
- name: Detection and analysis references
518522
items:
519523
- name: Top Microsoft Sentinel workbooks

articles/sentinel/ama-migrate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The following tables show gap analyses for the log types that currently rely on
4141
|**Multi-homing** | Collection only | Collection only |
4242
|**Application and service logs** | - | Collection only |
4343
|**Sysmon** | Collection only | Collection only |
44-
|**DNS logs** | - | Collection only |
44+
|**DNS logs** | [Windows DNS servers via AMA connector](connect-dns-ama.md) (Public preview) | [Windows DNS Server connector](data-connectors-reference.md#windows-dns-server-preview) (Public preview) |
4545

4646

4747
### Linux logs
@@ -57,7 +57,7 @@ The following tables show gap analyses for the log types that currently rely on
5757

5858
## Recommended migration plan
5959

60-
Each organization will have different metrics of success and internal migration processes. This section provides suggested guidance to considered when migrating from the Log Analytics MMA/OMS agent to the AMA, specifically for Microsoft Sentinel.
60+
Each organization will have different metrics of success and internal migration processes. This section provides suggested guidance to consider when migrating from the Log Analytics MMA/OMS agent to the AMA, specifically for Microsoft Sentinel.
6161

6262
**Include the following steps in your migration process**:
6363

articles/sentinel/connect-azure-windows-microsoft-services.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,14 @@ ms.custom: ignite-fall-2021
1010

1111
# Connect Microsoft Sentinel to Azure, Windows, Microsoft, and Amazon services
1212

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
1513
[!INCLUDE [reference-to-feature-availability](includes/reference-to-feature-availability.md)]
1614

1715
Microsoft Sentinel uses the Azure foundation to provide built-in, service-to-service support for data ingestion from many Azure and Microsoft 365 services, Amazon Web Services, and various Windows Server services. There are a few different methods through which these connections are made, and this article describes how to make these connections.
1816

17+
This article describes the collection of Windows Security Events. For Windows DNS events, learn about the [Windows DNS Events via AMA connector (Preview)](connect-dns-ama.md).
18+
19+
## Types of connections
20+
1921
This article discusses the following types of connectors:
2022

2123
- **API-based** connections
@@ -131,6 +133,10 @@ You can find and query the data for each resource type using the table name that
131133

132134
## Windows agent-based connections
133135

136+
> [!NOTE]
137+
>
138+
> The [Windows DNS Events via AMA connector (Preview)](connect-dns-ama.md) also uses the Azure Monitor Agent. This connector streams and filter events from Windows Domain Name System (DNS) server logs.
139+
134140
# [Azure Monitor Agent](#tab/AMA)
135141

136142
> [!IMPORTANT]

articles/sentinel/connect-dns-ama.md

Lines changed: 336 additions & 0 deletions
Large diffs are not rendered by default.

articles/sentinel/data-connectors-reference.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ ms.custom: ignite-fall-2021
1010

1111
# Find your Microsoft Sentinel data connector
1212

13-
[!INCLUDE [Banner for top of topics](./includes/banner.md)]
14-
1513
This article describes how to deploy data connectors in Microsoft Sentinel, listing all supported, out-of-the-box data connectors, together with links to generic deployment procedures, and extra steps required for specific connectors.
1614

1715
> [!TIP]
@@ -32,7 +30,6 @@ This article describes how to deploy data connectors in Microsoft Sentinel, list
3230
| **Azure Functions and the REST API** | [Use Azure Functions to connect Microsoft Sentinel to your data source](connect-azure-functions-template.md) |
3331
| **Syslog** | [Collect data from Linux-based sources using Syslog](connect-syslog.md) |
3432
| **Custom logs** | [Collect data in custom log formats to Microsoft Sentinel with the Log Analytics agent](connect-custom-logs.md) |
35-
|
3633

3734
> [!NOTE]
3835
> The **Azure service-to-service integration** data ingestion method links to three different sections of its article, depending on the connector type. Each connector's section below specifies the section within that article that it links to.
@@ -704,7 +701,7 @@ Configure eNcore to stream data via TCP to the Log Analytics Agent. This configu
704701

705702
## DNS (Preview)
706703

707-
**See [Windows DNS Server (Preview)](#windows-dns-server-preview).**
704+
**See [Windows DNS Events via AMA (Preview)](#windows-dns-events-via-ama-preview) or [Windows DNS Server (Preview)](#windows-dns-server-preview).**
708705

709706
## Dynamics 365
710707

@@ -1821,10 +1818,19 @@ Follow the instructions to obtain the credentials.
18211818
| **Vendor documentation/<br>installation instructions** | Contact [WireX support](https://wirexsystems.com/contact-us/) in order to configure your NFP solution to send Syslog messages in CEF format. |
18221819
| **Supported by** | [WireX Systems](mailto:[email protected]) |
18231820
1821+
## Windows DNS Events via AMA (Preview)
18241822
1823+
| Connector attribute | Description |
1824+
| --- | --- |
1825+
| **Data ingestion method** | **Azure service-to-service integration: <br>[Azure monitor Agent-based connection](connect-dns-ama.md)** |
1826+
| **Log Analytics table(s)** | DnsEvents<br>DnsInventory |
1827+
| **DCR support** | Standard DCR |
1828+
| **Supported by** | Microsoft |
18251829
18261830
## Windows DNS Server (Preview)
18271831
1832+
This connector uses the legacy agent. We recommend that you use the DNS over AMA connector above.
1833+
18281834
| Connector attribute | Description |
18291835
| --- | --- |
18301836
| **Data ingestion method** | **Azure service-to-service integration: <br>[Log Analytics agent-based connections](connect-azure-windows-microsoft-services.md?tabs=LAA#windows-agent-based-connections) (Legacy)** |
@@ -1879,8 +1885,9 @@ We recommend installing the [Advanced Security Information Model (ASIM)](normali
18791885
| **DCR support** | Standard DCR |
18801886
| **Supported by** | Microsoft |
18811887
1882-
1883-
See also: [**Security events via legacy agent**](#security-events-via-legacy-agent-windows) connector.
1888+
See also:
1889+
- [Windows DNS Events via AMA connector (Preview)](connect-dns-ama.md): Uses the Azure Monitor Agent to stream and filter events from Windows Domain Name System (DNS) server logs.
1890+
- [**Security events via legacy agent**](#security-events-via-legacy-agent-windows) connector.
18841891
18851892
### Configure the Security events / Windows Security Events connector for anomalous RDP login detection
18861893

articles/sentinel/dns-ama-fields.md

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Microsoft Sentinel DNS over AMA connector reference - available fields and normalization schema
3+
description: This article lists available fields for filtering DNS data using the Windows DNS Events via AMA connector, and the normalization schema for Windows DNS server fields.
4+
author: limwainstein
5+
ms.author: lwainstein
6+
ms.topic: reference
7+
ms.date: 09/01/2022
8+
---
9+
10+
# DNS over AMA connector reference - available fields and normalization schema
11+
12+
Microsoft Sentinel allows you to stream and filter events from your Windows Domain Name System (DNS) server logs to the `ASimDnsActivityLog` normalized schema table. This article describes the fields used for filtering the data, and the normalization schema for the Windows DNS server fields.
13+
14+
The Azure Monitor Agent (AMA) and its DNS extension are installed on your Windows Server to upload data from your DNS analytical logs to your Microsoft Sentinel workspace. You stream and filter the data using the [Windows DNS Events via AMA connector](dns-ama-fields.md).
15+
16+
## Available fields for filtering
17+
18+
This table shows the available fields. The field names are normalized using the [DNS schema](#asim-normalized-dns-schema).
19+
20+
|Field name |Values |Description |
21+
|---------|---------|---------|
22+
|EventOriginalType |Numbers between 256 and 280 |The Windows DNS eventID, which indicates the type of the DNS protocol event. |
23+
|EventResultDetails |• NOERROR<br>• FORMERR<br>• SERVFAIL<br>• NXDOMAIN<br>• NOTIMP<br>• REFUSED<br>• YXDOMAIN<br>• YXRRSET<br>• NXRRSET<br>• NOTAUTH<br>• NOTZONE<br>• DSOTYPENI<br>• BADVERS<br>• BADSIG<br>• BADKEY<br>• BADTIME<br>• BADALG<br>• BADTRUNC<br>• BADCOOKIE |The operation's DNS result string as defined by the Internet Assigned Numbers Authority (IANA). |
24+
|DvcIpAdrr |IP addresses |The IP address of the server reporting the event. This field also includes geo-location and malicious IP information. |
25+
|DnsQuery |Domain names (FQDN) |The string representing the domain name to be resolved.<br>• Can accept multiple values in a comma-separated list, and wildcards. For example:<br>`*.microsoft.com,google.com,facebook.com`<br>• Review these considerations for [using wildcards](connect-dns-ama.md#use-wildcards). |
26+
|DnsQueryTypeName |• A<br>• NS<br>• MD<br>• MF<br>• CNAME<br>• SOA<br>• MB<br>• MG<br>• MR<br>• NULL<br>• WKS<br>• PTR<br>• HINFO<br>• MINFO<br>• MX<br>• TXT<br>• RP<br>• AFSDB<br>• X25<br>• ISDN<br>• RT<br>• NSAP<br>• NSAP-PTR<br>• SIG<br>• KEY<br>• PX<br>• GPOS<br>• AAAA<br>• LOC<br>• NXT<br>• EID<br>• NIMLOC<br>• SRV |The requested DNS attribute. The DNS resource record type name as defined by IANA. |
27+
28+
## ASIM normalized DNS schema
29+
30+
This table describes and translates Windows DNS server fields into the normalized field names as they appear in the [DNS normalization schema](dns-normalization-schema.md#schema-details).
31+
32+
|Windows DNS field name |Normalized field name |Type |Description |
33+
|---------|---------|---------|---------|
34+
|EventID |EventOriginalType |String |The original event type or ID. |
35+
|RCODE |EventResult |String |The outcome of the event (success, partial, failure, NA). |
36+
|RCODE parsed |EventResultDetails |String |The DNS response code as defined by IANA. |
37+
|InterfaceIP |DvcIpAdrr |String |The IP address of the event reporting device or interface. |
38+
|AA |DnsFlagsAuthoritative |Integer |Indicates whether the response from the server was authoritative. |
39+
|AD |DnsFlagsAuthenticated |Integer |Indicates that the server verified all of the data in the answer and the authority of the response, according to the server policies. |
40+
|RQNAME |DnsQuery |String |The domain needs to be resolved. |
41+
|QTYPE |DnsQueryType |Integer |The DNS resource record type as defined by IANA. |
42+
|Port |SrcPortNumber |Integer |Source port sending the query. |
43+
|Source |SrcIpAddr |IP address |The IP address of the client sending the DNS request. For a recursive DNS request, this value is typically the reporting device's IP, in most cases, `127.0.0.1`. |
44+
|ElapsedTime |DnsNetworkDuration |Integer |The time it took to complete the DNS request. |
45+
|GUID |DnsSessionId |String |The DNS session identifier as reported by the reporting device. |
46+
47+
## Next steps
48+
49+
In this article, you learned about the fields used to filter DNS log data using the Windows DNS events via AMA connector. To learn more about Microsoft Sentinel, see the following articles:
50+
- Learn how to [get visibility into your data, and potential threats](get-visibility.md).
51+
- Get started [detecting threats with Microsoft Sentinel](detect-threats-built-in.md).
52+
- [Use workbooks](monitor-your-data.md) to monitor your data.
31.6 KB
Loading
31.3 KB
Loading
21.2 KB
Loading
28.5 KB
Loading

0 commit comments

Comments
 (0)